Optimizing Memory-Corruption Security Defenses for Real-Time Systems

Real-Time Systems (RTSs) frequently suffer from memory-corruption attacks. Compared to general-purpose systems, RTSs differ because of their scheduling requirements. For this reason, many modern-day security defenses are not compatible with RTSs or impose too much performance overhead to be schedula...

Full description

Bibliographic Details
Main Author: Horne, Amanda
Other Authors: Ward, Bryan
Format: Thesis
Published: Massachusetts Institute of Technology 2022
Online Access:https://hdl.handle.net/1721.1/144658
_version_ 1811085231691661312
author Horne, Amanda
author2 Ward, Bryan
author_facet Ward, Bryan
Horne, Amanda
author_sort Horne, Amanda
collection MIT
description Real-Time Systems (RTSs) frequently suffer from memory-corruption attacks. Compared to general-purpose systems, RTSs differ because of their scheduling requirements. For this reason, many modern-day security defenses are not compatible with RTSs or impose too much performance overhead to be schedulable. This thesis presents a new Mixed Integer Linear Programming optimization algorithm — Defense Optimization Algorithm for Real-time system Memory-Corruption Security (DOARMS) — that determines the optimal, yet schedulable, set of defenses to protect RTSs against memory-corruption attacks. Experiments using DOARMS showed that 71% or less utilization is needed for ideal security coverage with the defenses considered and that the algorithm produced better results than selecting the defenses with the best security coverage. A case-study using a smaller subset of defenses also showed that using worst-case instead of average-case performance overheads for defenses leads to lower security coverage, and that more work is needed to quantify the worst-case performance overheads. DOARMS also supports optional weights representing the importance of security for each task and prioritizes the security of the tasks according to those weights. The runtime performance of the algorithm is reasonable with a single optimization taking an average of ∼ 14s and a maximum of ∼ 114s to run, making it a useful tool to help RTS designers secure their RTSs from memory-corruption attacks.
first_indexed 2024-09-23T13:05:44Z
format Thesis
id mit-1721.1/144658
institution Massachusetts Institute of Technology
last_indexed 2024-09-23T13:05:44Z
publishDate 2022
publisher Massachusetts Institute of Technology
record_format dspace
spelling mit-1721.1/1446582022-08-30T03:31:12Z Optimizing Memory-Corruption Security Defenses for Real-Time Systems Horne, Amanda Ward, Bryan Burow, Nathan Shrobe, Howard Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science Real-Time Systems (RTSs) frequently suffer from memory-corruption attacks. Compared to general-purpose systems, RTSs differ because of their scheduling requirements. For this reason, many modern-day security defenses are not compatible with RTSs or impose too much performance overhead to be schedulable. This thesis presents a new Mixed Integer Linear Programming optimization algorithm — Defense Optimization Algorithm for Real-time system Memory-Corruption Security (DOARMS) — that determines the optimal, yet schedulable, set of defenses to protect RTSs against memory-corruption attacks. Experiments using DOARMS showed that 71% or less utilization is needed for ideal security coverage with the defenses considered and that the algorithm produced better results than selecting the defenses with the best security coverage. A case-study using a smaller subset of defenses also showed that using worst-case instead of average-case performance overheads for defenses leads to lower security coverage, and that more work is needed to quantify the worst-case performance overheads. DOARMS also supports optional weights representing the importance of security for each task and prioritizes the security of the tasks according to those weights. The runtime performance of the algorithm is reasonable with a single optimization taking an average of ∼ 14s and a maximum of ∼ 114s to run, making it a useful tool to help RTS designers secure their RTSs from memory-corruption attacks. M.Eng. S.B. 2022-08-29T16:02:45Z 2022-08-29T16:02:45Z 2022-05 2022-02-22T18:32:26.698Z Thesis https://hdl.handle.net/1721.1/144658 In Copyright - Educational Use Permitted Copyright MIT http://rightsstatements.org/page/InC-EDU/1.0/ application/pdf Massachusetts Institute of Technology
spellingShingle Horne, Amanda
Optimizing Memory-Corruption Security Defenses for Real-Time Systems
title Optimizing Memory-Corruption Security Defenses for Real-Time Systems
title_full Optimizing Memory-Corruption Security Defenses for Real-Time Systems
title_fullStr Optimizing Memory-Corruption Security Defenses for Real-Time Systems
title_full_unstemmed Optimizing Memory-Corruption Security Defenses for Real-Time Systems
title_short Optimizing Memory-Corruption Security Defenses for Real-Time Systems
title_sort optimizing memory corruption security defenses for real time systems
url https://hdl.handle.net/1721.1/144658
work_keys_str_mv AT horneamanda optimizingmemorycorruptionsecuritydefensesforrealtimesystems